Securing smart vehicles from relay attacks using machine learning

被引:0
作者
Usman Ahmad
Hong Song
Awais Bilal
Mamoun Alazab
Alireza Jolfaei
机构
[1] School of Computer Science and Technology,
[2] Beijing Institute of Technology,undefined
[3] Charles Darwin University,undefined
[4] Macquarie University,undefined
来源
The Journal of Supercomputing | 2020年 / 76卷
关键词
Machine learning; Neural networks; PKES; Relay attacks; Driver identification; Security;
D O I
暂无
中图分类号
学科分类号
摘要
Due to the rapid developments in intelligent transportation systems, modern vehicles have turned into intelligent transportation means which are able to exchange data through various communication protocols. Today’s vehicles portray best example of a cyber-physical system because of their integration of computational components and physical systems. As the IoT and data remain intrinsically linked together, the evolving nature of the transportation network comes with a risk of virtual vehicle hijacking. In this paper, we propose a combination of machine learning techniques to mitigate the relay attacks on Passive Keyless Entry and Start (PKES) systems. The proposed algorithm uses a set of key fob features that accurately profiles the PKES system and a set of driving features to identify the driver. First relay attack detection is performed, and if a relay attack is not detected, the vehicle is unlocked and algorithm proceeds to gain the driving features and use neural networks to identify whether the current driver is whom he/she claims to be. To assess the machine learning model, we compared the decision tree, SVM, and KNN method using a three-month log of a PKES system. Our test results confirm the effectiveness of the proposed method in recognizing relayed messages. The proposed methods achieve 99.8% accuracy rate. We used a Long Short-Term Memory recurrent neural network for driver identification based on the real-world driving data, which are collected from a driver who drives the vehicles on several routes in real-world traffic conditions.
引用
收藏
页码:2665 / 2682
页数:17
相关论文
共 56 条
[1]  
Eiza MH(2017)Driving with sharks: rethinking connected vehicles with vehicle cybersecurity IEEE Veh Technol Mag 12 45-51
[2]  
Ni Q(2018)Sound-proximity: 2-factor authentication against relay attack on passive keyless entry and start system J Adv Transp 2018 1935974-23
[3]  
Choi W(2018)Risks of trusting the physics of sensors Commun ACM 61 20-42
[4]  
Seo M(2019)Survey and classification of automotive security attacks Information 10 148-174
[5]  
Lee DH(2012)Image encryption using HC-128 and HC-256 stream ciphers Int J Electron Secur Digit Forensics 4 19-54
[6]  
Fu K(2001)Privacy and security concerns as major barriers for e-commerce: a survey study Inf Manag Comput Secur 9 165-4756
[7]  
Xu W(2011)Substitution-permutation based image cipher using chaotic henon and baker’s maps Int Rev Comput Softw 6 40-276
[8]  
Sommer F(2009)Intelligent vehicle power control based on machine learning of optimal control parameters and prediction of road type and traffic congestion IEEE Trans Veh Technol 58 4741-1709
[9]  
Dürrwang J(2010)A general active-learning framework for on-road vehicle recognition and tracking IEEE Trans Intell Transp Syst 11 267-2096
[10]  
Kriesten R(2015)Remote driver identification using minimal sensory data IEEE Commun Lett 19 1706-140